Blog Posts Tagged with "Google"

5e402abc3fedaf8927900f014ccc031f

Is Social Media Eroding Our Privacy?

September 05, 2011 Added by:Allan Pratt, MBA

As we have become more and more absorbed in social media, when was the point that we stopped caring about our confidential information? When did we lose control of our privacy? Is the simple solution to blame Mark Zuckerberg? Or should we blame companies who want access to our data?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Potentially Hundreds of Bogus Digital Certificates Issued

August 31, 2011 Added by:Headlines

"Chrome's hardcoded certificate blacklist actually increased by 247 entries... When a Comodo reseller was hacked back in March and its infrastructure was used to issue rogue certs for Google, Hotmail, Yahoo and other sites, Chrome's blacklist increased with just 10 certs..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Google Settles with DOJ for $500 Million Over Drug Ads

August 29, 2011 Added by:Headlines

“This investigation is about the patently unsafe, unlawful, importation of prescription drugs by Canadian on-line pharmacies, with Google’s knowledge and assistance, into the United States, directly to U.S. consumers,” said U.S. Attorney Neronha...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Yale Gets Google Dorked

August 24, 2011 Added by:Kelly Colgan

Knowing where your data is located, what are the access control mechanisms, and having an audit process to verify that resources are properly used, is generally part of every cyber risk program. When one of them fails, a data breach is inevitable...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Spear-Phishing Operation Targets Senior US Officials

August 16, 2011 Added by:Headlines

"Victims get a message from an address of a close associate or a collaborating organization/agency, which is spoofed. The message is crafted to look like a subscription form offering to enter Gmail credentials to activate it..."

Comments  (0)

Ba829a6cb97f554ffb0272cd3d6c18a7

Google is Your Friend - If You're a Lulzer

June 29, 2011 Added by:Kevin McAleavey

There are exploit GUI's readily available for PostgreSQL, MSSQL and Oracle as well as lesser and older databases. If it's there, and they can find it, and they can talk to it, and you're not properly filtering what can get to it, your site could very well be the next breaking news story...

Comments  (5)

5e402abc3fedaf8927900f014ccc031f

You Can't Fight Google, So Embrace Google

June 20, 2011 Added by:Allan Pratt, MBA

When creating a Google Profile, you may be as comprehensive or as minimal as you wish. But, without a doubt, include your name, photo, gender, professional overview, and some links. Take control of your Google Profile – it actually feels empowering in this era of too little online control...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Worse Than Zombies: The Mobile Botnets Are Coming

June 14, 2011 Added by:Kelly Colgan

As our smartphones have become our wallets and personal computers, holding everything from banking to social network information, they’ve become targets for hackers, scammers and criminals. Our phones hold a treasure trove of data—and the bad guys know it...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Google Zaps More Infected Android Applications

June 13, 2011 Added by:Headlines

"It [Plankton] has the ability to remotely access a command-and-control [C&C] server for instructions, and upload additional payloads. It uses a very stealthy method to push any malware it wants to phone... This is pretty serious..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

China Denies Orchestrating Gmail Hijacking Campaign

June 02, 2011 Added by:Headlines

"We are obviously very concerned about Google's announcement regarding a campaign that the company believes originated in China to collect the passwords of Google email account holders... These allegations are very serious... We're looking into them," said Secretary of State Hillary Clinton...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researcher Nabs Details from 35 Million Google Profiles

May 26, 2011 Added by:Headlines

“I wrote a small bash script to download all the sitemap-NNN(N).txt files mentioned in that file, and attempted to download 10k, then 100k, than 1M and then, utterly surprised that my connection wasn't blocked or throttled or CAPTCHA'd, [downloaded] the rest of them..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Android Privacy Flaw Exposes 99.7% of Users

May 19, 2011 Added by:Headlines

"Today we're starting to roll out a fix which addresses a potential security flaw that could, under certain circumstances, allow a third party access to data available in calendar and contacts. This fix requires no action from users and will roll out globally over the next few days..."

Comments  (0)

Af9c34417f8e5e0d240850bb353b5d40

Vupen Security: The First Pwn Troll Business?

May 16, 2011 Added by:Keith Mendoza

I don't know what credibility Vupen has left as a company in the eyes of the information security industry. They're actions are no different from patent trolls or the many script kiddies who troll around the web showing their half-baked warez...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

SMS Trojan Infects Multiple Android Applications

May 16, 2011 Added by:Headlines

"Google has removed the offending apps, published by "zsone," from the official Android Market, but researchers at the security firm Kaspersky Lab said it's possible the malware, classified as a Trojan because it hides inside software, affects more than the 11 apps AegisLab found..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Assange Claims Automated Intelligence Gathering on Facebook

May 04, 2011 Added by:Headlines

"Facebook, Google, Yahoo – all these major US organizations have built-in interfaces for US intelligence. It’s not a matter of serving a subpoena. They have an interface that they have developed for US intelligence to use..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Google Sued for Surreptitious Android Location Tracking

May 03, 2011 Added by:Headlines

The lawsuit alleges privacy violations for the collection of location data, deceptive business practices for failing to notify customers, and violations of the Computer Fraud and Abuse Act for harvesting the data from individual devices...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked